Abstract
Insider threats pose a serious risk to businesses yet risks posed by outsiders continue to remain in the spotlight. A study of insider threats is perhaps more difficult as researchers must address the socio-technical nature of the organization which requires a focus on interactions between individuals as well as between individuals and the organization’s information systems. For the purpose of this study the interpretive paradigm (Dhillon & Backhouse, 2001) was used to understand the organizational interactions. Business Intelligence tools were used to examine interactions between employees and the ERP system and revealed that illicit transactions can be found. Furthermore, tuning the diagnostic capabilities of the data analytics system to the unique characteristics of each employee increases the ability to find illicit transactions in real time.
Recommended Citation
Pike, Ronald, "Addressing Insider Threats in modern ERP Environments: Business Intelligence in the Cloud" (2012). AMCIS 2012 Proceedings. 72.
https://aisel.aisnet.org/amcis2012/proceedings/Posters/72
Addressing Insider Threats in modern ERP Environments: Business Intelligence in the Cloud
Insider threats pose a serious risk to businesses yet risks posed by outsiders continue to remain in the spotlight. A study of insider threats is perhaps more difficult as researchers must address the socio-technical nature of the organization which requires a focus on interactions between individuals as well as between individuals and the organization’s information systems. For the purpose of this study the interpretive paradigm (Dhillon & Backhouse, 2001) was used to understand the organizational interactions. Business Intelligence tools were used to examine interactions between employees and the ERP system and revealed that illicit transactions can be found. Furthermore, tuning the diagnostic capabilities of the data analytics system to the unique characteristics of each employee increases the ability to find illicit transactions in real time.